5.3

CVSS3.1

CVE-2025-58186 - Lack of limit when parsing cookies can cause memory exhaustion in net/http

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

πŸ“… Published: Oct. 29, 2025, 10:10 p.m. πŸ”„ Last Modified: Nov. 4, 2025, 9:13 p.m.

5.3

CVSS3.1

CVE-2025-47912 - Insufficient validation of bracketed IPv6 hostnames in net/url

The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: "http://[::1]/". IPv4 addresses and hostnames mus…

πŸ“… Published: Oct. 29, 2025, 10:10 p.m. πŸ”„ Last Modified: Nov. 4, 2025, 9:10 p.m.

7.5

CVSS3.1

CVE-2025-61723 - Quadratic complexity when parsing some invalid inputs in encoding/pem

The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.

πŸ“… Published: Oct. 29, 2025, 10:10 p.m. πŸ”„ Last Modified: Nov. 4, 2025, 9:14 p.m.

5.3

CVSS3.1

CVE-2025-58185 - Parsing DER payload can cause memory exhaustion in encoding/asn1

Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.

πŸ“… Published: Oct. 29, 2025, 10:10 p.m. πŸ”„ Last Modified: Nov. 4, 2025, 9:13 p.m.

7.5

CVSS3.1

CVE-2025-58187 - Quadratic complexity when checking name constraints in crypto/x509

Due to the design of the name constraint checking algorithm, the processing time of some inputs scals non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.

πŸ“… Published: Oct. 29, 2025, 10:10 p.m. πŸ”„ Last Modified: Nov. 4, 2025, 9:13 p.m.

5.3

CVSS3.1

CVE-2025-58189 - ALPN negotiation error contains attacker controlled information in crypto/tls

When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.

πŸ“… Published: Oct. 29, 2025, 10:10 p.m. πŸ”„ Last Modified: Nov. 4, 2025, 9:13 p.m.

7.5

CVSS3.1

CVE-2025-61725 - Excessive CPU consumption in ParseAddress in net/mail

The ParseAddress function constructeds domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.

πŸ“… Published: Oct. 29, 2025, 10:10 p.m. πŸ”„ Last Modified: Nov. 4, 2025, 9:14 p.m.

6.9

CVSS4.0

CVE-2025-61959 - Vertikal Systems Hospital Manager Backend Services Generation of Error Message Containing Sensitive…

Prior to September 19, 2025, the Hospital Manager Backend Services returned verbose ASP.NET error pages for invalid WebResource.axd requests, disclosing framework and ASP.NET version information, stack traces, internal paths, and the insecure configuration 'customErrors mode="Off"', which could hav…

πŸ“… Published: Oct. 29, 2025, 9:54 p.m. πŸ”„ Last Modified: Nov. 6, 2025, 7:20 p.m.

8.7

CVSS4.0

CVE-2025-54459 - Vertikal Systems Hospital Manager Backend Services Exposure of Sensitive System Information to an U…

Prior to September 19, 2025, the Hospital Manager Backend Services exposed the ASP.NET tracing endpoint /trace.axd without authentication, allowing a remote attacker to obtain live request traces and sensitive information such as request metadata, session identifiers, authorization headers, server …

πŸ“… Published: Oct. 29, 2025, 9:51 p.m. πŸ”„ Last Modified: Nov. 6, 2025, 7:21 p.m.

7.8

CVSS3.1

CVE-2025-10934 - GIMP XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability

GIMP XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or …

πŸ“… Published: Oct. 29, 2025, 7:58 p.m. πŸ”„ Last Modified: Nov. 4, 2025, 1:12 p.m.
Total resulsts: 317485
Page 127 of 31,749
Β« previous page Β» next page
Filters